Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science
|
|
- Colin Simon
- 5 years ago
- Views:
Transcription
1 FORENSIC SCIENCE JOURNAL SINCE 2002 Forensic Science Journal 2017;16(1):19-42 fsjournal.cpu.edu.tw DOI: /FSJ Applying the Sensor Noise based Camera Identification Technique to Trace Origin of Digital Images in Forensic Science Wen-Chao Yang 1*, Ph.D. ; Long-Huang Tsai 1, B.S. ; Chung-Hao Chen 2, Ph.D. 1 Department of Forensic Science, National Central Police University, Taoyuan City, Taiwan 2 Electrical and Computer Engineering Department, Old Dominion University, Norfolk, VA, U.S.A. Received: August 28, 2017; Accepted: September 30, Abstract With the rapid development of digital technologies, cameras and video recorders play an important role in our life, such as cell phones, cameras, or vehicle recorders. As a result, the easier we can access to those imaging devices, the more likely a perpetrator can use it to commit a crime, such as the invasion of privacy. Therefore, in recent years digital images and videos often play an important role as an evidence for coming a crime in court. Due to the rapid development of cloud and network technologies, we can easily spread digital images and videos via or social media. However, it is difficult for us to trace the origin of the digital image/video contents. In many crime events, such as spreading national secrecy or maliciously spreading privacy cases, the ability of determining the source of the digital image/ video contents is important. In this paper, an origin-tracing method based on sensor noise is proposed to tackle this issue. The experiment result shows that the classification accuracy is close to 100 percent in some cases. Keywords: digital image/video evidence, tracing origin, authentication, sensor noise Introduction Due to the rapid development of computer science and technology, the use of digital imaging devices has incredibly become popular. Digital imaging devices, such as cell phones, cameras, or vehicle recorders, have become commodity for everyone. It lets the offenders easily commit crimes, such as intrusion of privacy or cyber bullying using digital cameras or mobile phone cameras. In addition, due to the lack the appropriate method of tracing origin of digital images/videos, it is difficult for us to identify the original imaging device when the offenders use to spread digital images and videos using or social network methods. As a result, it becomes a challenging problem to use those images/videos as a legitimate evidence in court. Camera model identification is a technique to determine the camera model used to acquire a digital image of unknown provenance. It is based on the * Corresponding author: Wen-Chao Yang, Department of Forensic Science, National Central Police University, Taoyuan City, Taiwan. una135@mail.cpu.edu.tw
2 20 Forensic Science Journal 2017; 16(1) premise that images acquired by the same camera model share common characteristics. In this paper, we illustrate our proposed method based on sensor noise can trace the origin. More than 2000 photos acquired by six cameras and seven mobile phone cameras are used in our experiment to demonstrate the effectiveness of our proposed method. Related Works and Proposed Methods The researches of camera model identification can be divided into two categories based on whether embedded information is active or passive. For an active embedding method, it embeds the distinguishing characteristics in images (videos). Metadata analysis [1] and data hiding methods [2,3] belong to this. The Color Filter Array (CFA) interpolation artifacts [4,5], sensor dust [6], and PRNU [7-13] are considered as a passive detection method. For a metadata analysis, the JPEG or TIFF images in current digital cameras usually follow standards like TU-T T.81, JETF, EXIF, CIFF and DCF [1]. Thus, the resulting images can be used to describe imaging equipment, such as shooting conditions (Fig. 1) or GPS information (Fig. 2). However, there exists risk using metadata analysis to trace the source, because the metadata record of images is easy to be removed or modified, which has to carefully confirm the accuracy and integrity of the description. Fig. 1 A shooting condition example in EXIF file header [1].
3 Camera Identification Technique 21 Fig. 2 A GPS information example in EXIF file header [1]. The use of watermarking technology for imaging equipment to trace origin or verify the integrity is widely studied [2]. Blythe and Fridrich [3] proposed a lossless watermarking combined with photographer s iris information to verify the photographer and ensure the integrity of images. However, this technology is limited to patent rights and market demand, and are not widely applicable to all digital imaging devices. The work of passive detection methods, in contrast to active embedding methods, is recently developed. In 1999, Kurosawa et al. [7] first proposed that the nonuniformity or defects can be retained in the chargecoupled devices (CCDs) in the photosensitive element manufacturing process. It can be used like a fingerprint feature to identify the image of the lens in the study. This situation is as identical as bullet scratches allowing forensic analysts to match a bullet to a particular barrel or gun for tracing the gun owner. They used 9 video recorders which have four kinds of labels in the experiment. The results found that 8 of the video clips produced by the video camera can get the source of the lens. In addition, the image noise obtained by the experimental video recorder is different. In 2011, they [8] used the Bayesian framework to establish the approximate proportion of the ratio (likelihood ratio) based on the noise characteristics of the recorders. Lukas et al. conducted a series of studies on analysis of digital cameras based on PRNU in 2005 [9,10] and 2006 [11]. In [9] and [10], they used the Daubechies 8 wavelet (db8) filter to estimate noise and used the correlation coefficient for digital camera sources to make a comparison of 9 different digital cameras (see Table 1) and 2 file formats (TIFF and JPEG), the results are shown in Fig. 3 and Fig. 4.
4 22 Forensic Science Journal 2017; 16(1) Table 1 Cameras and properties used in experiments [9]. Camera brand Sensor Maximal resolution Image format Canon PowerShot A10 1/2.7-inch CCD JPEG Canon PowerShot G2 1/1.8-inch CCD CRW, JPEG Canon PowerShot S40 1/1.8-inch CCD CRW, JPEG Kodak DC TIFF, JPEG Olympus Camedia C765 UZ-1 1/2.5-inch CCD TIFF, JPEG Olympus Camedia C765 UZ-2 1/2.5-inch CCD TIFF, JPEG Nikon D mm Nikon DX CCD NEF-RAW, TIFF, JPEG Sigma SD mm CMOS-Foveon X X3F-RAW Olympus Camedia C3030 1/1.8-inch CCD TIFF, JPEG Fig. 3 Noise correlation from Olympus C765 (left) TIFF and Olympus C3030 (right) JPEG images with 9 reference patterns [9]. Fig. 4 Noise correlation from Canon G2 (left) and Nikon D100 (right) TIFF images with 9 reference patterns [9].
5 Camera Identification Technique 23 In both [9] and [10], they divided the noise into two main components [11], the fixed pattern noise (FPN) caused by dark currents and the photoresponse nonuniformity noise (PRNU) caused by pixel nonuniformity primarily. FPN primarily refers to the pixel-to-pixel difference when the sensor array is not exposed to light and its relationship to the exposure time and temperature. PRNU is caused by the inhomogeneity of the response of the light-sensitive element itself. They also proposed the mathematical model of image acquisition, according to the digital camera traceability analysis, the formula is shown as follows: y ij = f ij ( x ij + η ij )+c ij + ε ij (1) where i, j denote the coordinates of the image, i = 1,, m, j = 1,, n, m n is the resolution image, y ij and x ij respectively denotes the output and input of the capture sensor, η ij denotes the shot noise, c ij denotes the dark current, ε ij denotes the additive random noise, and the factors f ij are typically close to 1. In [11], they used the wavelet filter proposed in [12] as the denoise filter, and used different Garmma correction coefficients and compression ratios to analyze the sensor pattern noise in 9 different digital cameras (shown as Table 1). The experimental result is shown in Table 2. In Table 2, t denotes the correlation coefficient threshold used to distinguish the origin of images. FAR denotes the false acceptance rate and FRR denotes the false rejection rate. Table 2 Experimental results with FAR=10-3 [11]. Processing Camera None Gamma 0.7 Gamma 1.4 t FRR t FRR t FRR Nikon C C G S Sigma Kodak C A Processing Camera JPEG 90 JPEG 70 JPEG 50 t FRR t FRR t FRR Nikon C C G S Sigma Kodak
6 24 Forensic Science Journal 2017; 16(1) In 2009, Khanna et al. [13] used Daubechies 8 wavelet (Db8) filter as the denoise filter to estimate the imaging sensor pattern noise in 10 different cameras (shown in Table 3). They also use different size coefficients and file format conditions (see Table 3) to analyze the imaging sensor pattern noise. The experimental results are shown in Fig. 5 and Fig. 6. Table 3 Devices with respective setups for experiment[13]. Device Brand CCD Sensor Sensor Resolution Max. Picture Size Image Format c1 Canon PowerShot SD /2.5 inch 3.2 MP JPEG c2 Canon PowerShot SD /2.5 inch 3.2 MP JPEG c3 Nikon Coolpix /1.8 inch 7.1 MP JPEG c4 Panasonic DMC-FZ20 1/2.5 inch 5 MP JPEG/TIFF c5 Nikon Coolpix /2.5 inch 4 MP JPEG c6 Nokia 6630 (3G smartphone) JPEG c7 Olympus E-10 2/3 inch 4 MP JPEG/TIFF c8 Olympus D-360L JPEG/TIFF c9 Panasonic Lumix DMC-FZ4-1 1/2.5 inch 4 MP JPEG/TIFF c10 Panasonic Lumix DMC-FZ4-2 1/2.5 inch 4 MP JPEG/TIFF Fig. 5 Identification of low resolution (1024*768) c1 Canon SD200-1 images [13]. Fig. 6 The correlation values for various denoised images from c2 Canon SD200-2 images: the original images (left), the denoise images (right) [13].
7 Camera Identification Technique 25 In this paper, we apply the camera identification technique based on sensor noise in forensic science and propose an origin-tracing method based on foregoing research. The mathematic model is proposed as following: Y i = X i +Φ i + C i + ε i, (2) where Y i denotes the i-th output image, X i denotes the light information inputs for sensor in the i-th image, Φ i denotes the sensor noise (includes PRNU) in the i-th image, C i denotes the dark current in the i-th image, ε i denotes the random noise in the i-th image. We extract the noise pattern template as follows: Y' i = f d ( Y i ), (3) Y ' i denotes the i-th output image after denoise processing, f d (.) denotes the denoise function. N i = Y' i - Y i = Φ i + C i + ε i, (4) where N i denotes the noise in the i-th image. Because the ε i denotes the random noise in the i-th image, we assume it as a Gaussian random noise with zero mean, E ( ε i ) =0. Therefore, we obtain the noise pattern template N. N= E ( N i )=E ( Y' i - Y i )=Φ+C. (5) Experimental Results This section presents the experimental result of the camera identification technique based on sensor noise in different imaging devices. Digital cameras and mobile phones are used to verify the performance of our proposed camera identification technique. The list of digital cameras in the forensic science laboratory in Central Police University is shown as Table 4. The list of mobile phones is shown as Table 5. The noise pattern analysis algorithms were developed using Matlab 7. The Pearson correlation measure is used to as an evaluation measure to trace origin of digital photos. The testing platform is Microsoft Windows 7, Intel Core Duo 1.66 GHz with 2 GB memory. Table 4 The list of digital cameras in the experiment. Cameras No. Label Serial Number D80-1 Nikon D80 Digital SLR Camera D80-2 Nikon D80 Digital SLR Camera D90-1 Nikon D90 Digital SLR Camera D90-2 Nikon D90 Digital SLR Camera D Nikon D7000 Digital SLR Camera D Nikon D7000 Digital SLR Camera Camera Lens Serial Number Nikon 28-85mm f/ AF Nikkor Table 5 The list of mobile phones in the experiment. Label ASUS ZenFone 2 Laser (ZE550KL) ASUS ZenFone 2 ZE551ML-1 ASUS ZenFone 2 ZE551ML-2 HTC butterfly X920D Oppo r7sf Sony Xperia Z5 Sony Xperia Z5P Serial Number GCAZCY004318KMK F9AZFG F9AZFG FA33CPN c0cec4 BH903M6L4Z CB5A29R5F7
8 26 Forensic Science Journal 2017; 16(1) Digital cameras Six DSLR cameras with 3 focal length types (28mm, 50mm, and 85mm of the same camera lens) are combined into 18 different experiment samples (shown as Table 6) used in this experiment. We use the same shooting conditions, auto-mode, ISO 400, and Large JPEG (FINE) store format, to take more than 200 pictures for each experimental sample. The themes includes portrait and landscape shots. Afterwards, those photos are randomly divided into two groups, one for training noise pattern template, and the other group is used to validate the performance of our proposed method. We use the Daubechies 8 wavelet (Db8) filter and the Wiener filter as the denoise filter to extract the sensor noises. The experimental results are given in Appendix A. Table 6 The list of samples for digital cameras. Cameras No. Focus Length Experiment Samples ID D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D D mm D From the experimental result, we find out the Wiener filter is a better tool as a denoise filter for our proposed method to extract the sensor noise pattern. In addition, the focus length is also a factor to trace origin based on sensor noise pattern. In conclusion, according to the experimental result, the performance of the proposed is able to trace each origin based on sensor noise pattern with the threshold of correlation coefficient value. Mobile phones As the foregoing description, 7 different mobile phones (shown as Table 5) are used in this experiment. We use the shooting conditions, auto-mode and JPEG file format, to take more than 80 pictures for each device. Those themes include portrait and landscape shots. Then, we use the Wiener filter as the denoise filter to
9 Camera Identification Technique 27 extract the sensor noises. The experimental results are given in Appendix B. From the experimental result, we find out the performance of our proposed is able to trace each origin in mobile phone cameras with the threshold of 0.05 correlation coefficient value. Moreover, from the experimental result (Fig. B-6 and Fig. B-7), we can see that the sensor noise patterns in Sony Xperia Z5 and Sony Xperia Z5P have the same classification characteristics. Conclusions In this paper, the noise extraction mathematic model of sensor noise based camera identification technique is proposed. We also apply the sensor noise based camera identification technique to trace origin of digital photos in forensic science. Six DSLR cameras and seven mobile phone cameras are used in the experiment. The experimental results are shown that the proposed method has a good performance to trace origin of the experimental photos. In other word, we can find out the linkage between the photo and its capture device using just photo content by the proposed method. In our future work, we will add large devices to make an experiment to verify the generality of the proposed method. In addition, we will extend the proposed method to video evidence. Acknowledgements The authors would like to thank the anonymous reviewers for their insightful comments and valuable suggestions. This work was supported by National Science Council, Taiwan (MOST E ). References 1. Cohen K. Digital still camera forensics. Small Scale Digital Device Forensics Journal 2007;1(1): Cox I, Miller M, Bloom J, Fridrich J, Kalker T. Digital watermarking and steganography. Morgan Kaufmann Publisher, Blythe P, Fridrich J. Secure digital camera. Digital Forensic Research Workshop, Baltimore, Aug Popescu AC, Farid H. Exposing digital forgeries in color filter array interpolated images. IEEE Transactions on Signal Processing 2005;53(10): Swaminathan A, Wu M, Liu KJ-R. Non-intrusive forensic analysis of visual sensors using output images. IEEE Transactions of Information Forensics and Security 2007;2(1): Dirik AE, Sencar HT, Memon N. Digital single lens reflex camera identification from traces of sensor dust. IEEE Transactions on Information Forensics and Security 2008;3(3): Kurosawa K, Kuroki K, Saitoh N. CCD fingerprint method-identification of a video camera from videotaped images. Proc ICIP, October Geradts ZJ, Bijhold J, Kieft M, Kurosawa K, Kuroki K, Saitoh N. Methods for identification of images acquired with digital cameras. Proc SPIE Enabling Technologies for Law Enforcement and Security, 4232:505-12, 21 February Lukas J, Fridrich J, Goljan M. Determining digital image origin using sensor imperfections. Proc SPIE Electronic Imaging:249-60, San Jose, CA, January Lukas J, Fridrich J, Goljan M. Digital bullet scratches for images. Proc ICIP, Genova, Italy, September Lukas J, Fridrich J, Goljan M. Digital camera identification from sensor noise. IEEE Transactions on Information Security and Forensics 2006;1(2): Mihcak MK, Kozintsev I, Ramchandran K. Spatially adaptive statistical modeling of wavelet image coefficients and its application to denoising. Proc IEEE Int. Conf. Acoustics, Speech, Signal Processing;6:3253-6, Phoenix, AZ, March Khanna N, Mikkilineni AK, Delp EJ. Forensic camera classification: verification of sensor pattern noise approach. Forensic Science Communications 2009;11(1).
10 28 Forensic Science Journal 2017; 16(1) Appendix A Fig. A-1 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-2 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-3 The tracing origin result of photos acquired by D with the Db8 filter.
11 Camera Identification Technique 29 Fig. A-4 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-5 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-6 The tracing origin result of photos acquired by D with the Wiener filter.
12 30 Forensic Science Journal 2017; 16(1) Fig. A-7 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-8 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-9 The tracing origin result of photos acquired by D with the Db8 filter.
13 Camera Identification Technique 31 Fig. A-10 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-11 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-12 The tracing origin result of photos acquired by D with the Wiener filter.
14 32 Forensic Science Journal 2017; 16(1) Fig. A-13 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-14 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-15 The tracing origin result of photos acquired by D with the Db8 filter.
15 Camera Identification Technique 33 Fig. A-16 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-17 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-18 The tracing origin result of photos acquired by D with the Wiener filter.
16 34 Forensic Science Journal 2017; 16(1) Fig. A-19 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-20 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-21 The tracing origin result of photos acquired by D with the Db8 filter.
17 Camera Identification Technique 35 Fig. A-22 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-23 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-24 The tracing origin result of photos acquired by D with the Wiener filter.
18 36 Forensic Science Journal 2017; 16(1) Fig. A-25 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-26 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-27 The tracing origin result of photos acquired by D with the Db8 filter.
19 Camera Identification Technique 37 Fig. A-28 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-29 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-30 The tracing origin result of photos acquired by D with the Wiener filter.
20 38 Forensic Science Journal 2017; 16(1) Fig. A-31 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-32 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-33 The tracing origin result of photos acquired by D with the Db8 filter.
21 Camera Identification Technique 39 Fig. A-34 The tracing origin result of photos acquired by D with the Wiener filter. Fig. A-35 The tracing origin result of photos acquired by D with the Db8 filter. Fig. A-36 The tracing origin result of photos acquired by D with the Wiener filter.
22 40 Forensic Science Journal 2017; 16(1) Appendix B Fig. B-1 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 550KL. Fig. B-2 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 551ML1. Fig. B-3 The tracing origin result of photos acquired by ASUS Zenfone 2 ZE 551ML2.
23 Camera Identification Technique 41 Fig. B-4 The tracing origin result of photos acquired by HTC Butterfly X920D. Fig. B-5 The tracing origin result of photos acquired by Oppo R7SF. Fig. B-6 The tracing origin result of photos acquired by Sony Xperia Z5.
24 42 Forensic Science Journal 2017; 16(1) Fig. B-7 The tracing origin result of photos acquired by Sony Xperia Z5P.
Camera identification from sensor fingerprints: why noise matters
Camera identification from sensor fingerprints: why noise matters PS Multimedia Security 2010/2011 Yvonne Höller Peter Palfrader Department of Computer Science University of Salzburg January 2011 / PS
More informationDistinguishing between Camera and Scanned Images by Means of Frequency Analysis
Distinguishing between Camera and Scanned Images by Means of Frequency Analysis Roberto Caldelli, Irene Amerini, and Francesco Picchioni Media Integration and Communication Center - MICC, University of
More informationA STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS. Yu Chen and Vrizlynn L. L.
A STUDY ON THE PHOTO RESPONSE NON-UNIFORMITY NOISE PATTERN BASED IMAGE FORENSICS IN REAL-WORLD APPLICATIONS Yu Chen and Vrizlynn L. L. Thing Institute for Infocomm Research, 1 Fusionopolis Way, 138632,
More informationIMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION
IMPROVEMENTS ON SOURCE CAMERA-MODEL IDENTIFICATION BASED ON CFA INTERPOLATION Sevinc Bayram a, Husrev T. Sencar b, Nasir Memon b E-mail: sevincbayram@hotmail.com, taha@isis.poly.edu, memon@poly.edu a Dept.
More informationForensic Classification of Imaging Sensor Types
Forensic Classification of Imaging Sensor Types Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a,edwardj.delp a a School of Electrical and Computer Engineering b School of
More informationSOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS
SOURCE CAMERA IDENTIFICATION BASED ON SENSOR DUST CHARACTERISTICS A. Emir Dirik Polytechnic University Department of Electrical and Computer Engineering Brooklyn, NY, US Husrev T. Sencar, Nasir Memon Polytechnic
More informationSurvey On Passive-Blind Image Forensics
Survey On Passive-Blind Image Forensics Vinita Devi, Vikas Tiwari SIDDHI VINAYAK COLLEGE OF SCIENCE & HIGHER EDUCATION ALWAR, India Abstract Digital visual media represent nowadays one of the principal
More informationIDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION
Chapter 23 IDENTIFYING DIGITAL CAMERAS USING CFA INTERPOLATION Sevinc Bayram, Husrev Sencar and Nasir Memon Abstract In an earlier work [4], we proposed a technique for identifying digital camera models
More informationScanner Identification Using Sensor Pattern Noise
Scanner Identification Using Sensor Pattern Noise Nitin Khanna a, Aravind K. Mikkilineni b George T. C. Chiu b, Jan P. Allebach a, Edward J. Delp a a School of Electrical and Computer Engineering b School
More informationFragile Sensor Fingerprint Camera Identification
Fragile Sensor Fingerprint Camera Identification Erwin Quiring Matthias Kirchner Binghamton University IEEE International Workshop on Information Forensics and Security Rome, Italy November 19, 2015 Camera
More informationOpen Set Source Camera Attribution
Open Set Source Camera Attribution Filipe de O. Costa Institute of Computing University of Campinas (UNICAMP) Campinas, São Paulo, Brazil filipe.costa@students.ic.unicamp.br Michael Eckmann Dept. of Mathematics
More informationarxiv: v1 [cs.cv] 15 Mar 2017
SOURCE CAMERA IDENTIFICATION BASED ON CONTENT-ADAPTIVE FUSION NETWORK Pengpeng Yang, Wei Zhao, Rongrong Ni, and Yao Zhao arxiv:1703.04856v1 [cs.cv] 15 Mar 2017 Institute of Information Science, & Beijing
More informationCamera identification by grouping images from database, based on shared noise patterns
Camera identification by grouping images from database, based on shared noise patterns Teun Baar, Wiger van Houten, Zeno Geradts Digital Technology and Biometrics department, Netherlands Forensic Institute,
More informationWatermark Embedding in Digital Camera Firmware. Peter Meerwald, May 28, 2008
Watermark Embedding in Digital Camera Firmware Peter Meerwald, May 28, 2008 Application Scenario Digital images can be easily copied and tampered Active and passive methods have been proposed for copyright
More informationSource Camera Model Identification Using Features from contaminated Sensor Noise
Source Camera Model Identification Using Features from contaminated Sensor Noise Amel TUAMA 2,3, Frederic COMBY 2,3, Marc CHAUMONT 1,2,3 1 NÎMES UNIVERSITY, F-30021 Nîmes Cedex 1, France 2 MONTPELLIER
More informationImaging Sensor Noise as Digital X-Ray for Revealing Forgeries
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries Mo Chen, Jessica Fridrich, Jan Lukáš, and Miroslav Goljan Dept. of Electrical and Computer Engineering, SUNY Binghamton, Binghamton, NY 13902-6000,
More information2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge
2018 IEEE Signal Processing Cup: Forensic Camera Model Identification Challenge This competition is sponsored by the IEEE Signal Processing Society Introduction The IEEE Signal Processing Society s 2018
More informationCamera Model Identification Framework Using An Ensemble of Demosaicing Features
Camera Model Identification Framework Using An Ensemble of Demosaicing Features Chen Chen Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: chen.chen3359@drexel.edu
More informationAutomatic source camera identification using the intrinsic lens radial distortion
Automatic source camera identification using the intrinsic lens radial distortion Kai San Choi, Edmund Y. Lam, and Kenneth K. Y. Wong Department of Electrical and Electronic Engineering, University of
More informationSurvey on Source Camera Identification Using SPN with PRNU
Survey on Source Camera Identification Using SPN with PRNU Prof. Kapil Tajane, Tanaya Salunke, Pratik Bhavsar, Shubham Bodhe Computer Department Pimpri Chinchwad College of Engeering, Akurdi ABSTRACT Retrieving
More informationExposing Image Forgery with Blind Noise Estimation
Exposing Image Forgery with Blind Noise Estimation Xunyu Pan Computer Science Department University at Albany, SUNY Albany, NY 12222, USA xypan@cs.albany.edu Xing Zhang Computer Science Department University
More informationRetrieval of Large Scale Images and Camera Identification via Random Projections
Retrieval of Large Scale Images and Camera Identification via Random Projections Renuka S. Deshpande ME Student, Department of Computer Science Engineering, G H Raisoni Institute of Engineering and Management
More informationEfficient Estimation of CFA Pattern Configuration in Digital Camera Images
Faculty of Computer Science Institute of Systems Architecture, Privacy and Data Security esearch roup Efficient Estimation of CFA Pattern Configuration in Digital Camera Images Electronic Imaging 2010
More informationA JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS. Shruti Agarwal and Hany Farid
A JPEG CORNER ARTIFACT FROM DIRECTED ROUNDING OF DCT COEFFICIENTS Shruti Agarwal and Hany Farid Department of Computer Science, Dartmouth College, Hanover, NH 3755, USA {shruti.agarwal.gr, farid}@dartmouth.edu
More informationIntroduction to Video Forgery Detection: Part I
Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,
More informationTECHNICAL DOCUMENTATION
TECHNICAL DOCUMENTATION NEED HELP? Call us on +44 (0) 121 231 3215 TABLE OF CONTENTS Document Control and Authority...3 Introduction...4 Camera Image Creation Pipeline...5 Photo Metadata...6 Sensor Identification
More informationSource Camera Identification Forensics Based on Wavelet Features
Source Camera Identification Forensics Based on Wavelet Features Bo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng, China IIH-MSP-29 September 13, 29 Outline Introduction Image features based identification
More informationLaser Printer Source Forensics for Arbitrary Chinese Characters
Laser Printer Source Forensics for Arbitrary Chinese Characters Xiangwei Kong, Xin gang You,, Bo Wang, Shize Shang and Linjie Shen Information Security Research Center, Dalian University of Technology,
More informationOn the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts
On the usage of Sensor Pattern Noise for Picture-to-Identity linking through social network accounts Riccardo Satta and Pasquale Stirparo,2 Institute for the Protection and Security of the Citizen Joint
More informationity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li
ity Multimedia Forensics and Security through Provenance Inference Chang-Tsun Li School of Computing and Mathematics Charles Sturt University Australia Department of Computer Science University of Warwick
More informationForensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification
Attributing and Authenticating Evidence Forensic Framework Collection Identify and collect digital evidence selective acquisition? cloud storage? Generate data subset for examination? Examination of evidence
More informationCamera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM Classifier
Journal of Information Systems and Telecommunication, Vol. 1, No. 4, October - December 2013 233 Camera Identification Algorithm Based on Sensor Pattern Noise Using Wavelet Transform, SVD / PCA and SVM
More informationGIVEN the fast and widespread penetration of multimedia
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008 539 Digital Single Lens Reflex Camera Identification From Traces of Sensor Dust Ahmet Emir Dirik, Husrev Taha Sencar,
More informationDigital Image Authentication from Thumbnails
Digital Image Authentication from Thumbnails Eric Kee and Hany Farid Department of Computer Science, Dartmouth College, Hanover NH 3755, USA ABSTRACT We describe how to exploit the formation and storage
More informationSmartphone image acquisition forensics using sensor fingerprint
IET Computer Vision Research Article Smartphone image acquisition forensics using sensor fingerprint ISSN 1751-9632 Received on 1st August 2014 Revised on 26th October 2014 Accepted on 24th November 2014
More informationCOLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee
COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the
More informationIMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY. Khosro Bahrami and Alex C. Kot
24 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) IMAGE TAMPERING DETECTION BY EXPOSING BLUR TYPE INCONSISTENCY Khosro Bahrami and Alex C. Kot School of Electrical and
More informationColour-Decoupled Photo Response Non-Uniformity for. Digital Image Forensics
Colour-Decoupled Photo Response Non-Uniformity for Digital mage Forensics Chang-Tsun Li 1 and Yue Li 2 1 Department of Computer Science, University of arwick, Coventry CV4 7AL, UK c-t.li@warwick.ac.uk
More informationChapter 2-Digital Components
Chapter 2-Digital Components What Makes Digital Cameras Work? This is how the D-SLR (Digital Single Lens Reflex) Camera works. The sensor This is the light sensitive part of your camera There are two basic
More informationWatermarking of Raw Digital Images in Camera Firmware: Embedding and Detection
Watermarking of Raw Digital Images in Camera Firmware: Embedding and Detection Peter Meerwald and Andreas Uhl University of Salzburg, Dept. of Computer Sciences, Jakob-Haringer-Str. 2, A-20 Salzburg, Austria
More informationMethods for identification of images acquired with Digital cameras
Header for SPIE use Methods for identification of images acquired with Digital cameras Zeno J Geradts(a), Jurrien Bijhold(a), Martijn Kieft(a), Kenji Kurosawa(b), Kenro Kuroki(b), Naoki Saitoh(b) (a) Netherlands
More informationA survey of forensic characterization methods for physical devices 5
digital investigation 3S (2006) S17 S28 available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin A survey of forensic characterization methods for physical devices 5 Nitin Khanna
More informationCERIAS Tech Report Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance
CERIAS Tech Report 29-38 Forensic characterization of image capture devices by Nitin Khanna Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN 4797-286
More informationFootwear & Tire Tread Photography A comparison of digital resolution vs. 35mm film
Steve Everist, King County Sheriff s Office, WA William Fluit, Sioux Falls Police Department, SD Forensic Photography III, Michael Brooks, January 29, 2007 Footwear & Tire Tread Photography A comparison
More informationWatermarking-based Image Authentication with Recovery Capability using Halftoning and IWT
Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT Luis Rosales-Roldan, Manuel Cedillo-Hernández, Mariko Nakano-Miyatake, Héctor Pérez-Meana Postgraduate Section,
More informationPRIOR IMAGE JPEG-COMPRESSION DETECTION
Applied Computer Science, vol. 12, no. 3, pp. 17 28 Submitted: 2016-07-27 Revised: 2016-09-05 Accepted: 2016-09-09 Compression detection, Image quality, JPEG Grzegorz KOZIEL * PRIOR IMAGE JPEG-COMPRESSION
More informationCan We Trust Digital Image Forensics?
Can We Trust Digital Image Forensics? ABSTRACT Thomas Gloe Technische Universität Dresden Institute for System Architecture 162 Dresden, Germany thomas.gloe@inf.tu-dresden.de Antje Winkler Technische Universität
More informationSource Camera Identification Using Enhanced Sensor Pattern Noise
T-IFS-011-009 1 Source Camera Identification Using Enhanced Sensor Pattern Noise Chang-Tsun L Member, IEEE Abstract Sensor pattern noises (SPNs), extracted from digital images to serve as the fingerprints
More informationCanon Digital Manual Camera Price In India Below 5000 >>>CLICK HERE<<<
Canon Digital Manual Camera Price In India Below 5000 Camera under Rs. 5000 in India as on 2015 Jul 05th. Currently 22 Cameras are available in the Price Range of Rs. 3344 to Rs. 5000. Only Best. Buy Canon
More informationOriginal citation: Li, C-T. (2012). Color-Decoupled Photo Response Non-Uniformity for Digital mage Forensics. EEE Transactions on Circuits and Systems for Video Technology, 22(2), pp. 260-271 Permanent
More informationA Novel Multi-size Block Benford s Law Scheme for Printer Identification
A Novel Multi-size Block Benford s Law Scheme for Printer Identification Weina Jiang 1, Anthony T.S. Ho 1, Helen Treharne 1, and Yun Q. Shi 2 1 Dept. of Computing, University of Surrey Guildford, GU2 7XH,
More informationMultimedia Forensics
Multimedia Forensics Using Mathematics and Machine Learning to Determine an Image's Source and Authenticity Matthew C. Stamm Multimedia & Information Security Lab (MISL) Department of Electrical and Computer
More informationImplementation of the Likelihood Ratio framework for camera identification based
Implementation of the Likelihood Ratio framework for camera identification based on sensor noise patterns Wiger van Houten 1, Ivo Alberink, Zeno Geradts Criminal Investigation Unit North, Digital Evidence
More informationForensic Hash for Multimedia Information
Forensic Hash for Multimedia Information Wenjun Lu, Avinash L. Varna and Min Wu Department of Electrical and Computer Engineering, University of Maryland, College Park, U.S.A email: {wenjunlu, varna, minwu}@eng.umd.edu
More informationDetection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Table
Detection of Image Forgery was Created from Bitmap and JPEG Images using Quantization Tran Dang Hien University of Engineering and Eechnology, VietNam National Univerity, VietNam Pham Van At Department
More informationPoS(CENet2015)037. Recording Device Identification Based on Cepstral Mixed Features. Speaker 2
Based on Cepstral Mixed Features 12 School of Information and Communication Engineering,Dalian University of Technology,Dalian, 116024, Liaoning, P.R. China E-mail:zww110221@163.com Xiangwei Kong, Xingang
More informationUsing sensor noise to identify low resolution compressed videos from YouTube
Using sensor noise to identify low resolution compressed videos from YouTube Wiger van Houten and Zeno Geradts Abstract The Photo Response Non-Uniformity acts as a digital fingerprint that can be used
More informationLiterature Survey on Image Manipulation Detection
Literature Survey on Image Manipulation Detection Rani Mariya Joseph 1, Chithra A.S. 2 1M.Tech Student, Computer Science and Engineering, LMCST, Kerala, India 2 Asso. Professor, Computer Science And Engineering,
More informationForensic Image and Video Processing. Dallas, AAFS, 17 February 2004.
Workshop Forensic Image and Video Processing Dallas, AAFS, 17 February 2004. Outline 08.30 09.00 Introduction by Zeno Geradts Netherlands Forensic Institute 09.00 10.00 Photogrammetry by Richard Vorderbruegge
More informationFrom Image to Sensor: Comparative Evaluation of Multiple PRNU Estimation Schemes for Identifying Sensors from NIR Iris Images
S. Banerjee and A. Ross, "From Image to Sensor: Comparative Evaluation of Multiple PRU Estimation Schemes for Identifying Sensors from IR Iris Images," 5th International Workshop on Biometrics and Forensics
More informationA Study of Slanted-Edge MTF Stability and Repeatability
A Study of Slanted-Edge MTF Stability and Repeatability Jackson K.M. Roland Imatest LLC, 2995 Wilderness Place Suite 103, Boulder, CO, USA ABSTRACT The slanted-edge method of measuring the spatial frequency
More informationImage Tampering Localization via Estimating the Non-Aligned Double JPEG compression
Image Tampering Localization via Estimating the Non-Aligned Double JPEG compression Lanying Wu a, Xiangwei Kong* a, Bo Wang a, Shize Shang a a School of Information and Communication Engineering, Dalian
More informationAccording to the proposed AWB methods as described in Chapter 3, the following
Chapter 4 Experiment 4.1 Introduction According to the proposed AWB methods as described in Chapter 3, the following experiments were designed to evaluate the feasibility and robustness of the algorithms.
More informationImage De-Noising Using a Fast Non-Local Averaging Algorithm
Image De-Noising Using a Fast Non-Local Averaging Algorithm RADU CIPRIAN BILCU 1, MARKKU VEHVILAINEN 2 1,2 Multimedia Technologies Laboratory, Nokia Research Center Visiokatu 1, FIN-33720, Tampere FINLAND
More informationDIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES
International Journal of Advanced Technology & Engineering Research (IJATER) 3 rd International e-conference on Emerging Trends in Technology DIGITAL DOCTORED VIDEO FORGERY DETECTION TECHNIQUES Govindraj
More information89% Gold Award. Sep 14, 2016 Oct 16, Aug 25, 2016 Jul 25, 2017 Oct 25, Mid-size SLR Mid-size SLR SLR-style mirrorless
Side by side 3 cameras compared Canon EOS 5D Mark IV Nikon D850 Sony Alpha 7R III Basic Information Review / Preview 87% Gold Award 89% Gold Award Sep 14, 2016 Oct 16, 2017 Announced Aug 25, 2016 Jul 25,
More informationForgery Detection using Noise Inconsistency: A Review
Forgery Detection using Noise Inconsistency: A Review Savita Walia, Mandeep Kaur UIET, Panjab University Chandigarh ABSTRACT: The effects of digital forgeries and image manipulations may not be seen by
More informationWITH the rapid development of image processing technology,
480 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5, NO. 3, SEPTEMBER 2010 JPEG Error Analysis and Its Applications to Digital Image Forensics Weiqi Luo, Member, IEEE, Jiwu Huang, Senior
More informationCanon Digital-Ixus V Jun 2001
L i s t o f C a m e r a s - D C B A list of digital cameras which can be used in conjunction with Swarovski Optik's ATS and STS telescopes using the Swarovski Optik digital camera adapter DCB. Canon Digital-Ixus
More informationCamera Image Processing Pipeline
Lecture 13: Camera Image Processing Pipeline Visual Computing Systems Today (actually all week) Operations that take photons hitting a sensor to a high-quality image Processing systems used to efficiently
More informationABC: Enabling Smartphone Authentication with Built-in Camera
ABC: Enabling Smartphone Authentication with Built-in Camera Zhongjie Ba, Sixu Piao, Xinwen Fu f, Dimitrios Koutsonikolas, Aziz Mohaisen f and Kui Ren f 1 Camera Identification: Hardware Distortion Manufacturing
More informationExposing Digital Forgeries from JPEG Ghosts
1 Exposing Digital Forgeries from JPEG Ghosts Hany Farid, Member, IEEE Abstract When creating a digital forgery, it is often necessary to combine several images, for example, when compositing one person
More information>--- UnSorted Tag Reference [ExifTool -a -m -u -G -sort ] ExifTool Ver: 10.07
From Image File C:\AEB\RAW_Test\_MG_4376.CR2 Total Tags = 433 (Includes Composite Tags) and Duplicate Tags >------ SORTED Tag Position >--- UnSorted Tag Reference [ExifTool -a -m -u -G -sort ] ExifTool
More informationVISUAL sensor technologies have experienced tremendous
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 2, NO. 1, MARCH 2007 91 Nonintrusive Component Forensics of Visual Sensors Using Output Images Ashwin Swaminathan, Student Member, IEEE, Min
More informationCamera Image Processing Pipeline: Part II
Lecture 14: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements
More informationWindows. DxO Optics Pro v8.5 Release notes. System requirements
DxO Optics Pro v8.5 Release notes Windows System requirements Processor: o Minimum: Intel Core 2 Duo, AMD Athlon 64 X2 or higher. o Recommended: Intel Core i5, AMD Phenom II X4 or higher. RAM: o Minimum:
More informationDetection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery
Detection of Misaligned Cropping and Recompression with the Same Quantization Matrix and Relevant Forgery Qingzhong Liu Department of Computer Science Sam Houston State University Huntsville, TX 77341,
More informationImplementation of the likelihood ratio framework for camera identification based on sensor noise patterns
Law, Probability and Risk (2011) 10, 149 159 doi:10.1093/lpr/mgr006 Implementation of the likelihood ratio framework for camera identification based on sensor noise patterns WIGER VAN HOUTEN Digital Evidence
More informationKent Academic Repository
Kent Academic Repository Full text document (pdf Citation for published version Sandoval Orozco, A.L. and Arenas, Gonzalez and Rosales, Corripio and Garcia Villalba, L.J. and Hernandez-Castro, Julio C.
More informationImplementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design
2009 nternational Symposium on Computing, Communication, and Control (SCCC 2009) Proc.of CST vol.1 (2011) (2011) ACST Press, Singapore mplementation of a Visible Watermarking in a Secure Still Digital
More informationColor PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method
Journal of Information Hiding and Multimedia Signal Processing c 015 ISSN 073-41 Ubiquitous International Volume 6, Number 3, May 015 Color PNG Image Authentication Scheme Based on Rehashing and Secret
More informationSplicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies
International Journal of Computer and Communication Engineering, Vol. 4, No., January 25 Splicing Forgery Exposure in Digital Image by Detecting Noise Discrepancies Bo Liu and Chi-Man Pun Noise patterns
More informationS SNR 10log. peak peak MSE. 1 MSE I i j
Noise Estimation Using Filtering and SVD for Image Tampering Detection U. M. Gokhale, Y.V.Joshi G.H.Raisoni Institute of Engineering and Technology for women, Nagpur Walchand College of Engineering, Sangli
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 3, September 2012
A Tailored Anti-Forensic Approach for Digital Image Compression S.Manimurugan, Athira B.Kaimal Abstract- The influence of digital images on modern society is incredible; image processing has now become
More informationCanon Digital Manual Camera Models With Price In India
Canon Digital Manual Camera Models With Price In India Amazon.in: Buy camera lenses online at low price in india at More Buying Choices, 13 offers from 8,900.00, (30), See newer model of this item Canon
More informationImage acquisition. In both cases, the digital sensing element is one of the following: Line array Area array. Single sensor
Image acquisition Digital images are acquired by direct digital acquisition (digital still/video cameras), or scanning material acquired as analog signals (slides, photographs, etc.). In both cases, the
More informationCamera Image Processing Pipeline: Part II
Lecture 13: Camera Image Processing Pipeline: Part II Visual Computing Systems Today Finish image processing pipeline Auto-focus / auto-exposure Camera processing elements Smart phone processing elements
More informationUSING SENSOR DIRT FOR TOOLMARK ANALYSIS OF DIGITAL PHOTOGRAPHS
Chapter 16 USING SENSOR DIRT FOR TOOLMARK ANALYSIS OF DIGITAL PHOTOGRAPHS Martin Olivier Abstract Dust particles that collect on the image sensors of digital cameras oftenleavemarksonthepicturestakenwiththesecameras.
More informationA Reversible Data Hiding Scheme Based on Prediction Difference
2017 2 nd International Conference on Computer Science and Technology (CST 2017) ISBN: 978-1-60595-461-5 A Reversible Data Hiding Scheme Based on Prediction Difference Ze-rui SUN 1,a*, Guo-en XIA 1,2,
More informationPrices of digital cameras
Prices of digital cameras The August 2012 issue of Consumer Reports included a report on digital cameras. The magazine listed 60 cameras, all of which were recommended by them, divided into six categories
More informationSURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES. Received August 2008; accepted October 2008
ICIC Express Letters ICIC International c 2008 ISSN 1881-803X Volume 2, Number 4, December 2008 pp. 409 414 SURVEILLANCE SYSTEMS WITH AUTOMATIC RESTORATION OF LINEAR MOTION AND OUT-OF-FOCUS BLURRED IMAGES
More informationAn Automatic JPEG Ghost Detection Approach for Digital Image Forensics
An Automatic JPEG Ghost Detection Approach for Digital Image Forensics Sepideh Azarian-Pour Sharif University of Technology Tehran, 4588-89694, Iran Email: sepideazarian@gmailcom Massoud Babaie-Zadeh Sharif
More informationBlind Verification of Digital Image Originality: A Statistical Approach
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 9, SEPTEMBER 2013 1531 Blind Verification of Digital Image Originality: A Statistical Approach Babak Mahdian, Radim Nedbal, and Stanislav
More informationMobile Camera Source Identification with SVD
Mobile Camera Source Identification with SVD A-R Soobhany, KP Lam, P Fletcher, DJ Collins Research Institute for the Environment, Physical Sciences and Applied Mathematics Keele University Keele, Staffordshire,
More informationDoes Nikon Coolpix L310 Have Manual Mode
Does Nikon Coolpix L310 Have Manual Mode Recent Nikon Coolpix L310 questions, problems & answers. Free expert Coolpix L310 Manual Nikon It always wants to format cards we have been using. Product Manual
More informationDigital Imaging with the Nikon D1X and D100 cameras. A tutorial with Simon Stafford
Digital Imaging with the Nikon D1X and D100 cameras A tutorial with Simon Stafford Contents Fundamental issues of Digital Imaging Camera controls Practical Issues Questions & Answers (hopefully!) Digital
More informationMichigan Technological University. Characterization of Unpaved Road Condition Through the Use of Remote Sensing
Michigan Technological University Characterization of Unpaved Road Condition Through the Use of Remote Sensing Deliverable 4-A: Sensor Selection for use in Remote Sensing the Phenomena of Unpaved Road
More informationBest Camera Manual Lens For Canon Eos 60d Twin
Best Camera Manual Lens For Canon Eos 60d Twin Buy Canon EOS 60D DSLR Camera with 18-200mm Lens features 18 MP Along with its manual controls, the EOS 60D allows for full use of Canon EF and EF-S Each
More informationSony Cybershot Manual 12.1 Megapixel Digital Camera Price In Pakistan
Sony Cybershot Manual 12.1 Megapixel Digital Camera Price In Pakistan Because our price on this item is lower than the manufacturer's suggested retail Sony DSC- WX300/B 18.2 MP Digital Camera with 20x
More informationExposing Image Splicing with Inconsistent Local Noise Variances
Exposing Image Splicing with Inconsistent Local Noise Variances Xunyu Pan Xing Zhang Siwei Lyu Computer Science Department University at Albany, State University of New York {xzhang5,xypan,slyu@albany.edu
More information